Author:
Yang Tao,Chen JiangChuan,Deng Hongli,He Baolin
Funder
Sichuan Province Science and Technology Support Program
Reference38 articles.
1. Cyber forensics framework for big data analytics in IoT environment using machine learning;Chhabra;Multimedia Tools and Applications,2020
2. https://www.gsma.com/
3. Analysis of network intrusion detection technology;Xue;Network Security Technology & Application,2020
4. Anderson J P. Computer security threat monitoring and surveillance[J]. Technical Report, James P. Anderson Company, 1980.
5. Efficient intrusion detection system using random tree[J];Deepa;International Journal of Enterprise Network Management,2015